نتایج جستجو برای: dental leakages
تعداد نتایج: 162691 فیلتر نتایج به سال:
While monetary and prudential policies are generally analysed separately, this paper focuses on how the two interact. Taking an international perspective, we show that policy in a centre economy (Euro Area) spill over its borders through bank lending – therefore inducing volatility cross-border flows. Investigating sample of 30 advanced emerging economies, find evidence receiving-country intera...
In this paper we address the problem of automatically detecting leakages in underground pipes of district heating networks from images captured by an airborne thermal camera. The basic idea is to classify each relevant image region as a leakage if its temperature exceeds a threshold. This simple approach yields a significant number of false positives. We propose to address this issue by machine...
Hypothesis / aims of study Some lower urinary tract dysfunctions remain unexplained after a urodynamic testing. Functional etiology is then considered. A comprehensive care combining muscular training and behavioral and cognitive therapy (BCT) [1-2] can be proposed before a more invasive investigation. In our practice, this approach is mainly applied to patients who complain of urgency frequenc...
This paper describes a vacuum-decay based evaporative leak detection procedure for vehicle fuel systems. A physical model for an evaporative system is proposed containing parts for fuel evaporation, leakage flow and canister flow. Two methods for detecting evaporative leakages based on the model is presented. Both methods can detect a 0.5 mm diameter leakage in a laboratory environment.
Data sharing with multiple parties over a third-party distribution framework requires that both data integrity and confidentiality be assured. One of the most widely used data organization structures is the tree structure. When such structures encode sensitive information (such as in XML documents), it is crucial that integrity and confidentiality be assured not only for the content, but also f...
Leakage resilient cryptography aims to address the issue of inadvertent and unexpected information leakages from physical cryptographic implementations. At Asiacrypt 2010, E.Kiltz et al. [1] presented a multiplicatively blinded version of ElGamal public-key encryption scheme, which is proved to be leakage resilient in the generic group model against roughly 0.50*log(p) bits of arbitrary, advers...
Oil and gas pipeline leakages lead to not only enormous economic loss but also environmental disasters. How detect the damages including cracks has attracted much research attention. One of promising leakage detection method is use zirconate titanate (PZT) transducers negative pressure wave when occurs. PZT can generate guided stress waves for crack also. However, or may be easily detected with...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید